Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-12-2024 14:51

General

  • Target

    a40e1563e9bbc7683cc81adcecdf4450817ad2e18ee8534b85714081a500dd65.exe

  • Size

    743KB

  • MD5

    9cf34288dda36ca0b013d6978d1acfe4

  • SHA1

    634560fe79683a2019ee75f669e5bff02c1789f7

  • SHA256

    a40e1563e9bbc7683cc81adcecdf4450817ad2e18ee8534b85714081a500dd65

  • SHA512

    fcf0a8ce71ce9bb1fcba9f14158e8919098dfa75172128bf886bd256216a3b9ef0e44c1ac63177e228fb85522077c8aa1080e2bd415ce29fe341a39dd942f764

  • SSDEEP

    12288:GN2pJlOwXBiPzEhmH5lxgZvvXt+FgqQ8t/6SUoWDGxPlh3i4H9ksxUWv:XrZvPQqqQ8tCSQoh3hxd

Malware Config

Extracted

Family

xenorat

C2

luxuryshield.giize.com

Mutex

Xeno_rat_nd8912d

Attributes
  • delay

    5000

  • install_path

    nothingset

  • port

    4444

  • startup_name

    nothingset

Signatures

  • Detect XenoRat Payload 1 IoCs
  • XenorRat

    XenorRat is a remote access trojan written in C#.

  • Xenorat family
  • Drops startup file 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a40e1563e9bbc7683cc81adcecdf4450817ad2e18ee8534b85714081a500dd65.exe
    "C:\Users\Admin\AppData\Local\Temp\a40e1563e9bbc7683cc81adcecdf4450817ad2e18ee8534b85714081a500dd65.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2204-0-0x000000007445E000-0x000000007445F000-memory.dmp

    Filesize

    4KB

  • memory/2204-1-0x0000000000510000-0x00000000005D0000-memory.dmp

    Filesize

    768KB

  • memory/2204-2-0x0000000004FC0000-0x000000000505C000-memory.dmp

    Filesize

    624KB

  • memory/2204-3-0x0000000005610000-0x0000000005BB4000-memory.dmp

    Filesize

    5.6MB

  • memory/2204-5-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

    Filesize

    64KB

  • memory/2204-6-0x0000000005F60000-0x0000000005F68000-memory.dmp

    Filesize

    32KB

  • memory/2204-7-0x0000000074450000-0x0000000074C00000-memory.dmp

    Filesize

    7.7MB

  • memory/2204-10-0x0000000074450000-0x0000000074C00000-memory.dmp

    Filesize

    7.7MB

  • memory/2312-8-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2312-11-0x0000000074450000-0x0000000074C00000-memory.dmp

    Filesize

    7.7MB

  • memory/2312-12-0x0000000074450000-0x0000000074C00000-memory.dmp

    Filesize

    7.7MB

  • memory/2312-13-0x0000000074450000-0x0000000074C00000-memory.dmp

    Filesize

    7.7MB